The data base of selected permutations
The so called selected permutations, which can be used to compose S-boxes in the DES-like ciphers, are classified under the action of a transformation group G*. A method for building up a data base of the selected permutations is given. In fact, we have built up a data base which consists of one representative from each of the G*-equivaIent classes, it turns out that the data base is of size 17433 and can be easily memorized by the help of a small magnetic disc. The constructed data base together with the applications of the group G* will produce totally 17433×3×29 selected permutations, which can be used to provide ready raw material for composing S-boxes.
Key wordsDES S-boxes Permutations
Unable to display preview. Download preview PDF.
- C. Adams and S. Tavares, “The Structured Design of Cryptographically Good S-Boxes”, J. Cryptology, Vol.3, No. 1,1990.Google Scholar
- D. K. Bransted, J. Gait and S. Katzke, “Report of the Workshop on Cryptography in Support of Computer Security”, NBS, Sept. 1977.Google Scholar
- E. F. Brickell, J. H. Moore and M. It. Purtill, “Structure in the S-boxe of the DES”, in Advances in Cryptology: Proc. of CRYPTO'86.Google Scholar
- R. Forre, “The strict avalanche criterion:spectral properties of boolean functions and an extended definition”, in Advances in Cryptology: Proc. of CRYPTO'88.Google Scholar
- A. F. Webster and S. E. Tavares, “On the design of S-boxes”, in Advances in Cryptology: Proc. of CRYPTO'85.Google Scholar
- J. H. Yang, Z. D. Dai and K. C. Zeng, “A Cryptographic Study on S-boxes of DES Type (I). An integrated analysis of the Design Criteria for S-boxes”, To appear at “System Science and Mathematics”, 1991.Google Scholar
- K. C. Zeng, Z. D. Dai and J. H. Yang, “A Cryptographic Study on S-boxes of DES Type (II). An Entropy Leakage Analysis for the Key”, To appear at “System Science and Mathematics”, 1991.Google Scholar